O'Reilly logo

CISSP Practice Exams, Fourth Edition, 4th Edition by Shon Harris

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

CHAPTER 5

Identity and Access Management

This domain includes questions from the following topics:

•  Identification methods and technologies

•  Authentication methods, models, and technologies

•  Discretionary, mandatory, and nondiscretionary models

•  Accountability, monitoring, and auditing practices

•  Registration and proof of identity

•  Identity as a Service

•  Threats to access control practices and technologies

Controlling access to resources is a vital element of any information security program. Controlling who can access what and when helps protect information assets and company resources from unauthorized modification and disclosure. Thus, access controls address all three services in the AIC triad—availability, integrity, and confidentiality—be ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required